-
1
-
-
84937579774
-
The oracle diffie-hellman assumptions and an analysis of DHIES
-
Naccache, D. (ed.) CT-RSA 2001. Springer, Heidelberg
-
Abdalla, M., Bellare, M., Rogaway, P.: The oracle diffie-hellman assumptions and an analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 143-158. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2020
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
2
-
-
77954625601
-
Efficient lattice (H)IBE in the standard model
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553-572. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 553-572
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
3
-
-
77949577768
-
Threshold decryption and zero-knowledge proofs for lattice-based cryptosystems
-
Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
-
Bendlin, R., Damgård, I.: Threshold decryption and zero-knowledge proofs for lattice-based cryptosystems. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 201-218. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 201-218
-
-
Bendlin, R.1
Damgård, I.2
-
4
-
-
0020932981
-
Comparison of two pseudo-random number generators
-
Blum, L., Blum, M., Shub, M.: Comparison of two pseudo-random number generators. In: CRYPTO 1982, pp. 61-78 (1982)
-
(1982)
CRYPTO 1982
, pp. 61-78
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
5
-
-
84949995981
-
An efficient probabilistic public-key encryption scheme which hides all partial information
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
Blum, M., Goldwasser, S.: An efficient probabilistic public-key encryption scheme which hides all partial information. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 289-299. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 289-299
-
-
Blum, M.1
Goldwasser, S.2
-
6
-
-
0003153237
-
Non-interactive zero-knowledge and its applications
-
Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications. In: STOC, pp. 103-112 (1988)
-
(1988)
STOC
, pp. 103-112
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
7
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586-615 (2003)
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
8
-
-
23044435711
-
Short signatures from the weil pairing
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptology 17(4), 297-319 (2004)
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
9
-
-
33745655389
-
Chosen ciphertext secure public key threshold encryption without random oracles
-
Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
-
Boneh, D., Boyen, X., Halevi, S.: Chosen ciphertext secure public key threshold encryption without random oracles. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 226-243. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3860
, pp. 226-243
-
-
Boneh, D.1
Boyen, X.2
Halevi, S.3
-
10
-
-
33745767987
-
Direct chosen ciphertext security from identity-based techniques
-
Boyen, X., Mei, Q., Waters, B.: Direct chosen ciphertext security from identity-based techniques. In: ACM CCS, pp. 320-329 (2005)
-
(2005)
ACM CCS
, pp. 320-329
-
-
Boyen, X.1
Mei, Q.2
Waters, B.3
-
11
-
-
84957712291
-
An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Canetti, R., Goldwasser, S.: An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 90-106. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 90-106
-
-
Canetti, R.1
Goldwasser, S.2
-
12
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
13
-
-
85001025766
-
Wallet databases with observers
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89-105. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
14
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
-
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
15
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
16
-
-
84867553981
-
A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
-
Kim, K.-c. (ed.) PKC 2001. Springer, Heidelberg
-
Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119-136. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1992
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
17
-
-
85028462775
-
Zero-knowledge proofs of knowledge without interaction
-
De Santis, A., Persiano, G.: Zero-knowledge proofs of knowledge without interaction. In: FOCS, pp. 427-436 (1992)
-
(1992)
FOCS
, pp. 427-436
-
-
De Santis, A.1
Persiano, G.2
-
18
-
-
0027961556
-
How to share a function securely
-
De Santis, A., Desmedt, Y., Frankel, Y., Yung, M.: How to share a function securely. In: STOC, pp. 522-533 (1994)
-
(1994)
STOC
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
19
-
-
85032188633
-
Society and group oriented cryptography: A new concept
-
Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
-
Desmedt, Y.: Society and group oriented cryptography: A new concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120-127. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 120-127
-
-
Desmedt, Y.1
-
20
-
-
85023809951
-
Threshold cryptosystems
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307-315. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
21
-
-
85022187530
-
Shared generation of authenticators and signatures
-
extended abstract. Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures (extended abstract). In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 457-469. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
22
-
-
35248899841
-
Public key trace and revoke scheme secure against adaptive chosen ciphertext attack
-
Desmedt, Y.G. (ed.) PKC 2003. Springer, Heidelberg
-
Dodis, Y., Fazio, N.: Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 100-115. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2567
, pp. 100-115
-
-
Dodis, Y.1
Fazio, N.2
-
23
-
-
84979291225
-
Broadcast encryption
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480-491. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
24
-
-
84946827596
-
Threshold cryptosystems secure against chosen-ciphertext attacks
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Fouque, P.-A., Pointcheval, D.: Threshold cryptosystems secure against chosen-ciphertext attacks. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 351-368. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 351-368
-
-
Fouque, P.-A.1
Pointcheval, D.2
-
25
-
-
84944328129
-
Sharing decryption in the context of voting or lotteries
-
Frankel, Y. (ed.) FC 2000. Springer, Heidelberg
-
Fouque, P.-A., Poupard, G., Stern, J.: Sharing decryption in the context of voting or lotteries. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 90-104. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1962
, pp. 90-104
-
-
Fouque, P.-A.1
Poupard, G.2
Stern, J.3
-
26
-
-
0029713931
-
Witness-based cryptographic program checking and robust function sharing
-
Frankel, Y., Gemmell, P., Yung, M.: Witness-based cryptographic program checking and robust function sharing. In: STOC, pp. 499-508 (1996)
-
(1996)
STOC
, pp. 499-508
-
-
Frankel, Y.1
Gemmell, P.2
Yung, M.3
-
27
-
-
84947926543
-
Robust threshold DSS signatures
-
Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
-
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust threshold DSS signatures. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 354-371. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
28
-
-
84947441722
-
Robust and efficient sharing of RSA functions
-
Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
-
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust and efficient sharing of RSA functions. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 157-172. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
29
-
-
49049089688
-
Secure distributed key generation for discrete-log based cryptosystems
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 295-310. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
30
-
-
44449121781
-
Threshold RSA for dynamic and ad-hoc groups
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Gennaro, R., Halevi, S., Krawczyk, H., Rabin, T.: Threshold RSA for dynamic and ad-hoc groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 88-107. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 88-107
-
-
Gennaro, R.1
Halevi, S.2
Krawczyk, H.3
Rabin, T.4
-
31
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: STOC, pp. 25-32 (1989)
-
(1989)
STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
32
-
-
67650677267
-
Practical chosen ciphertext secure encryption from factoring
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Hofheinz, D., Kiltz, E.: Practical chosen ciphertext secure encryption from factoring. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 313-332. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 313-332
-
-
Hofheinz, D.1
Kiltz, E.2
-
33
-
-
70350302871
-
The group of signed quadratic residues and applications
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Hofheinz, D., Kiltz, E.: The group of signed quadratic residues and applications. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 637-653. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 637-653
-
-
Hofheinz, D.1
Kiltz, E.2
-
34
-
-
84958741591
-
Threshold cryptosystems based on factoring
-
Zheng, Y. (ed.) ASIACRYPT 2002. Springer, Heidelberg
-
Katz, J., Yung, M.: Threshold cryptosystems based on factoring. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 192-205. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 192-205
-
-
Katz, J.1
Yung, M.2
-
35
-
-
38049077895
-
Chosen-ciphertext secure key-encapsulation based on gap hashed diffie-hellman
-
Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
-
Kiltz, E.: Chosen-ciphertext secure key-encapsulation based on gap hashed diffie-hellman. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 282-297. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4450
, pp. 282-297
-
-
Kiltz, E.1
-
36
-
-
84944319284
-
Efficient trace and revoke schemes
-
Frankel, Y. (ed.) FC 2000. Springer, Heidelberg
-
Naor, M., Pinkas, B.: Efficient trace and revoke schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1-20. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1962
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
37
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: STOC, pp. 427-437 (1990)
-
(1990)
STOC
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
38
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433-444. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
39
-
-
38049015677
-
On the generation of cryptographically strong pseudorandom sequences
-
Shamir, A.: On the generation of cryptographically strong pseudorandom sequences. ACM Trans. Comput. Syst. 1(1), 38-44 (1983)
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, Issue.1
, pp. 38-44
-
-
Shamir, A.1
-
40
-
-
84948954277
-
Practical threshold signatures
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Shoup, V.: Practical threshold signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207-220. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 207-220
-
-
Shoup, V.1
-
41
-
-
1842599265
-
Securing threshold cryptosystems against chosen ciphertext attack
-
Shoup, V., Gennaro, R.: Securing threshold cryptosystems against chosen ciphertext attack. J. Cryptology 15(2), 75-96 (2002)
-
(2002)
J. Cryptology
, vol.15
, Issue.2
, pp. 75-96
-
-
Shoup, V.1
Gennaro, R.2
-
42
-
-
77957000385
-
Efficient chosen-ciphertext security via extractable hash proofs
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Wee, H.: Efficient chosen-ciphertext security via extractable hash proofs. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 314-332. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 314-332
-
-
Wee, H.1
|